• Information Security: Principles and Practices (2nd Edition) (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedur...

    • ASIN: 0789753251
    • Brand: Pearson IT Certification

  • Penetration Testing: A Hands-On Introduction to Hacking

    Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques t...

    • ASIN: 1593275641
    • Brand: No Starch Press
    • UPC: 884600461290

  • Enterprise Mobility Suite Managing BYOD and Company-Owned Devices (IT Best Practices - Microsoft Press)

    Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy...

    • ASIN: 0735698406

  • Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD (IT Best Practices - Microsoft Press)

    Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 3...

    • ASIN: 150930133X
    • Brand: MICROSOFT PRESS

  • Enterprise IoT: Strategies and Best Practices for Connected Products and Services

    Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models.With a set of best pr...

    • ASIN: 1491924837
    • Brand: O'Reilly Media

  • Skype for Business Unleashed

    Skype for Business Unleashed This is the most comprehensive, realistic, and useful guide to Skype for  Business Server 2015, Microsoft’s most powerful unified communications system. Four leading Microsoft unified communications consultants share in-the-trenches guidance for planning, integration, migration, deployment, administration, and...

    • ASIN: 0672338491

  • Networking All-in-One For Dummies

    Are you ready to build a network, but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks you through the basics. With nine self-contained minibooks that feature the latest updates on networking trends, including revised content for Windows 10 and Windows Server 2016, as well as updated coverage of broadband technologie...

    • ASIN: 1119154723
    • Brand: imusti

  • Digital Forensics: Threatscape and Best Practices

    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, cohere...

    • ASIN: 0128045264

  • Digital Forensics Explained

    The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a ...

    • ASIN: 1439874956

  • Mastering Skype for Business 2015

    Authoritative, hands-on guidance for Skype Business administrators Mastering Skype for Business 2015 gives administrators the comprehensive coverage they need to effectively utilize Skype for Business. Fully up to date for the 2015 release, this guide walks you through industry best practices for planning, design, configuration, deployment, and man...

    • ASIN: 1119225353
    • Brand: imusti

  • Bring Your Own Devices (BYOD) Survival Guide

    Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri...

    • ASIN: B00OD4266U

  • Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International ... 2007 (Lecture Notes in Computer Science)

    This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007. The 20 revised full papers are organized in topical sections on mobility, hardw...

    • ASIN: 3540723536
    • Brand: Brand: Springer

  • Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, ... (Lecture Notes in Computer Science)

    This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. ...

    • ASIN: 3662438259
    • Brand: Naccache David
    • UPC: 003662438259

  • Java Programming: 24-Hour Trainer

    Quick and painless Java programming with expert multimedia instruction Java Programming 24-Hour Trainer, 2nd Edition is your complete beginner's guide to the Java programming language, with easy-to-follow lessons and supplemental exercises that help you get up and running quickly. Step-by-step instruction walks you through the basics of object-orie...

    • ASIN: 111895145X
    • Brand: Wrox Press

  • Diameter: New Generation AAA Protocol - Design, Practice, and Applications

    Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to un...

    • ASIN: 1118875907

  • Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future Development - eBook

    Master's Thesis from the year 2010 in the subject Business economics - Marketing, Corporate Communication, CRM, Market Research, Social Media, grade: 1.3, University of Applied Sciences Giessen, language: English, abstract: This study fundamentally attempts to

    • UPC: 413939215

  • Getting Started with iPhone SDK, Android and others: Mobile Application Development - Create your Mobile Applications Best Practices Guide - eBook

    This book covers the known relative differences between the most popular mobile platform development options for handheld devices such as personal digital assistants, enterprise digital assistants or mobile phones. It helps guide developers in choosing

    • UPC: 418621219

  • Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future Development

    Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future

    • UPC: 788595201

  • Getting Started with iPhone SDK, Android and Others : Mobile Application Development - Create Your Mobile Applications Best Practices Guide

    Getting Started with IPhone SDK, Android and Others: Mobile Application Development - Create Your Mobile Applications Best Practices

    • UPC: 10963856

  • Community Policing - A European Perspective : Strategies, Best Practices and Guidelines

    Details Coming Soon

    • UPC: 56085204

  • Android Application Security

    15 iPhone Security Best Practices | 4 Minute Tech

    Mobile App Security Best Practices for Developers